Simulation 7
R1
key chain AUTH_ISIS
key 2
key-string C1sco!
exit
int range et0/0 , et1/0
isis authen key-chain AUTH_ISIS
ip isis
isis metric 15
Copy run start
R2
key chain AUTH_ISIS
key 2
key-string C1sco!
exit
int range et0/0 , et1/0
isis authen key-chain AUTH_ISIS
ip isis
isis metric 20
Copy run start
R3
key chain AUTH_ISIS
key 2
key-string C1sco!
exit
int range et0/0 , et1/0
isis authen key-chain AUTH_ISIS
ip isis
isis metric 25
Copy run start
Valda
4 months agoAshlyn
3 months agoMerilyn
3 months agoKathryn
3 months agoMammie
3 months agoDesirae
4 months agoMelvin
4 months agoTamra
3 months agoLoren
3 months agoCatalina
4 months agoGracia
4 months agoLeonora
4 months agoEdwin
4 months agoChrista
4 months agoLuther
4 months agoCallie
4 months agoAngelyn
5 months agoLuther
5 months agoCallie
5 months ago